Secure, Robust and Flexible Cooperative Downloading Scheme for Highway VANETs
Zhang, Yan, Zhang, Lei, Ni, Dingkai, Choo, Kim-Kwang Raymond, Kang, Burong
Published in IEEE access (2021)
Published in IEEE access (2021)
Get full text
Journal Article
Hybrid and Hierarchical Aggregation-Verification Scheme for VANET
Zhang, Lei, Kang, Burong, Dai, Feifei, Zhang, Yan, Liu, Hong
Published in IEEE transactions on vehicular technology (01.10.2022)
Published in IEEE transactions on vehicular technology (01.10.2022)
Get full text
Journal Article
Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing
Meng, Xinyu, Zhang, Lei, Kang, Burong
Published in IEEE transactions on cloud computing (01.07.2022)
Published in IEEE transactions on cloud computing (01.07.2022)
Get full text
Journal Article
ID-Based Signcryption Scheme Using Extended Chaotic Maps
Wang Caifen, Burong, Kang
Published in 2016 International Symposium on Computer, Consumer and Control (IS3C) (01.07.2016)
Published in 2016 International Symposium on Computer, Consumer and Control (IS3C) (01.07.2016)
Get full text
Conference Proceeding
Secure and Reliable Parking Protocol Based on Blockchain for VANETs
Zhang, Yan, Zhang, Lei, Kang, Burong, Ma, Yue, Chen, Tong
Published in 2021 IEEE Wireless Communications and Networking Conference (WCNC) (29.03.2021)
Published in 2021 IEEE Wireless Communications and Networking Conference (WCNC) (29.03.2021)
Get full text
Conference Proceeding
Cryptographic Reverse Firewall for Digital Signature in Fog Computing
Kang, Burong, Lian, Huanhuan, Zhou, Xuhua, Zhou, Weniun
Published in 2023 6th International Conference on Software Engineering and Computer Science (CSECS) (22.12.2023)
Published in 2023 6th International Conference on Software Engineering and Computer Science (CSECS) (22.12.2023)
Get full text
Conference Proceeding
Privacy-Preserving Task Allocation Based on QoS in Crowd Sensing
Gui, Bin, Kang, Burong, Meng, Xinyu, Zhang, Lei
Published in 2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS) (01.03.2020)
Published in 2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS) (01.03.2020)
Get full text
Conference Proceeding
Cross-domain identity authentication method based on proxy re-signature
YANG XIAODONG, KANG BURONG, LI YANAN, LI CHENYI, ZHANG LINGGANG, ZHOU QIXU, GAO GUOJUAN, YANG MIAOMIAO, DENG YUNXIA
Year of Publication 20.04.2016
Get full text
Year of Publication 20.04.2016
Patent